Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose
Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose
摘要
In this paper, we propose a new notion of secure disguisable symmetric encryption schemes, which captures the idea that the attacker can decrypt an encrypted fie to different meaningful values when different keys are put to the decryption algorithm. This notion is aimed for the following anti-forensics purpose: the attacker can cheat the forensics investigator by decrypting an encrypted file to a meaningful file other than that one he encrypted, in the case that he is caught by the forensics investigator and ordered to hand over the key for decryption. We then present a construction of secure disguisable symmetric encryption schemes.
参考文献10
-
1BARAK B, GOLDREICH O, IMPAGLIAZZO R, et al. On the (Im)possbility of Obfuscating Programs [ C]// Proceedings of CRYPTO 2001, LNCS 2139. Springer, Berlin, 2001: 1-18.
-
2BERGHEL H. Hiding Data, Forensics, and Anti-forensics[J]. Communications of the ACM, 2007, 50(4): 15-20.
-
3CANETTI R. Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information[C]// Proceedings of Crypto 1997, LNCS 1294. Springer, Berlin, 1997: 455-469.
-
4CANETTI R, DAKDOUK R. Obfuscating Point Functions With Multibit Output [ C ]// Proceedings of EUROCRYPT'08, LNCS 4965. Springer, Berlin, 2008: 489- 508.
-
5CANETTI R, MICCIANCIO D, REINGOLD O. Perfectly One-way Probabilistic Hash Functions [C]// Proceedings of STOC'98, ACM. New York, 1998: 131-140.
-
6CABRERA J B D, LEWIS L, MEHARA R. Detection and Classification of Intrusion and Faults Using Sequences of System Calls [J]. ACM SIGMOD Record, 2001, 30(4): 25 -34.
-
7GARFINKEL S. Anti-forensics: Techniques, Detection and Countermeasures [ C ]// Proceedings of 2nd International Conference on i-Warfare and Security (ICIW), ACI, 2007:8-9.
-
8GOLDREICH O. Foundations of Cryptography, Basic Tools[M]. Cambridge University Press, 2001.
-
9MOHAY G M, ANDERSON A, COLLIE B, et al. Computer and Intrusion Forensics [M]. Artech House, Inc., Norwood, MA, USA, 2003.
-
10WEE H. On Obfuscating Point Functions[ C]// Proceedings of STOC'05, ACM, New York, 2005: 523-532.
-
1柴彦斌,柴延花.常用文件的加密和解密[J].农村电工,2005,13(4):32-32.
-
2李全忠.如何寻找隐藏的文件[J].新浪潮,1989(1):38-38.
-
3郑玉红,李政.WPS文字处理系统文件解密[J].微计算机信息,1995,11(3):54-56.
-
4邓卫东.使用MD5算法进行文件数字签名[J].成铁科技,2003(4):40-42.
-
5图尔克公司蝉联先进外企奖[J].国内外机电一体化技术,2008,11(5).
-
6图尔克公司再获天津市先进外企奖[J].电气时代,2008(7):111-111.
-
7李小维.对付磁盘加密王,我有绝招[J].电脑爱好者,2006,0(18):41-41.
-
8陶健.秘密制造者——WinxFile[J].电脑爱好者,1999,0(13):23-23.
-
9HU ZhenYu,SUN FuChun,JIANG JianChun.Ciphertext verification security of symmetric encryption schemes[J].Science in China(Series F),2009,52(9):1617-1631. 被引量:4
-
10丁保华,孟凡喜.WPS文件的解密与再加密[J].计算机应用研究,1996,13(4):123-125.